Showing 1,281 - 1,300 results of 2,784 for search '((((( usedds OR usedddds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.30s Refine Results
  1. 1281

    Health Care Professionals’ Use of Digital Technology in the Secondary Prevention of Cardiovascular Disease in Austria: Online Survey Study by Luisa Lunz, Sabine Würth, Stefan Tino Kulnik

    Published 2025-06-01
    “…Quantitative survey data were analyzed using descriptive statistics, group comparison tests, and association statistics. …”
    Get full text
    Article
  2. 1282

    Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation by Shilpi Gautam, Asadi Srinivasulu

    Published 2023-12-01
    “…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
    Get full text
    Article
  3. 1283
  4. 1284

    Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence by Jia LIU

    Published 2024-07-01
    “…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
    Get full text
    Article
  5. 1285

    Mental Health Classification Using Machine Learning with PCA and Logistics Regression Approaches for Decision Making by Hendra Hendra, Mustafa Mat Deris, Ika Safitri Windiarti

    Published 2025-02-01
    “…Mental health statistics come with numerous challenges, beginning with data integrity. Ensuring data accuracy and reliability is essential, especially if these datasets are to be used for advanced analysis or research. …”
    Get full text
    Article
  6. 1286
  7. 1287
  8. 1288

    Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation by Maryam Fatima, Praveen Pachauri, Wasim Akram, Mohd Parvez, Shadab Ahmad, Zeinebou Yahya

    Published 2024-09-01
    “…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
    Get full text
    Article
  9. 1289

    Standardized patient profile review using large language models for case adjudication in observational research by Martijn J. Schuemie, Anna Ostropolets, Aleh Zhuk, Uladzislau Korsik, Seung In Seo, Marc A. Suchard, George Hripcsak, Patrick B. Ryan

    Published 2025-01-01
    “…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
    Get full text
    Article
  10. 1290

    Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study by Muhammad Shah, Shimee Shahzadi, Shehzad Akbar Khan

    Published 2025-01-01
    “…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
    Get full text
    Article
  11. 1291

    CogTrack: A Proof of Concept for Cognition Tracker by Yesoda Bhargava, Kanthi Kumar Kattupalli, Veeky Baths

    Published 2024-01-01
    “…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
    Get full text
    Article
  12. 1292

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
    Get full text
    Article
  13. 1293

    Client aware adaptive federated learning using UCB-based reinforcement for people re-identification by Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem

    Published 2025-05-01
    “…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
    Get full text
    Article
  14. 1294

    Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method by Didik Sudyana, Nora Lizarti

    Published 2019-05-01
    “…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
    Get full text
    Article
  15. 1295

    A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation by Denis Moser, Matthias Bender, Murat Sariyar

    Published 2025-12-01
    “…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
    Get full text
    Article
  16. 1296

    Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ by Stefanus Eko Prasetyo, Haeruddin, Tiara

    Published 2024-12-01
    “… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
    Get full text
    Article
  17. 1297

    Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe, Ahmet Kürşad Türker

    Published 2025-07-01
    “…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
    Get full text
    Article
  18. 1298
  19. 1299

    GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor by Hong Nhung Nguyen, Yong-Hwa Kim

    Published 2025-01-01
    “…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
    Get full text
    Article
  20. 1300

    Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform. by Anjir Ahmed Chowdhury, S M Hasan Mahmud, Md Palash Uddin, Seifedine Kadry, Jung-Yeon Kim, Yunyoung Nam

    Published 2025-01-01
    “…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
    Get full text
    Article